CN112396140B - RFID chip verification system with anti-air interception and encryption communication functions - Google Patents

RFID chip verification system with anti-air interception and encryption communication functions Download PDF

Info

Publication number
CN112396140B
CN112396140B CN201911140463.7A CN201911140463A CN112396140B CN 112396140 B CN112396140 B CN 112396140B CN 201911140463 A CN201911140463 A CN 201911140463A CN 112396140 B CN112396140 B CN 112396140B
Authority
CN
China
Prior art keywords
data
rule
password
scrambling
reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911140463.7A
Other languages
Chinese (zh)
Other versions
CN112396140A (en
Inventor
江峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Qiantairen Investment Management Co ltd
Original Assignee
Sichuan Qiantairen Investment Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Qiantairen Investment Management Co ltd filed Critical Sichuan Qiantairen Investment Management Co ltd
Priority to CN201911140463.7A priority Critical patent/CN112396140B/en
Publication of CN112396140A publication Critical patent/CN112396140A/en
Application granted granted Critical
Publication of CN112396140B publication Critical patent/CN112396140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks

Abstract

The invention discloses an RFID authentication system with functions of preventing air interception and encrypting communication, which can not restore authentication information into the authentication information even if a counterfeiter intercepts data I or data II in the air when a reader-writer writes the authentication information into an RFID tag. Avoiding the possibility of a counterfeiter to mass scan genuine RFID tags to make counterfeit tags. So that the genuine RFID tag does not contain RFID tags that become "false".

Description

RFID chip verification system with anti-air interception and encryption communication functions
Technical Field
The invention relates to an anti-counterfeiting verification technology.
Background
The RFID electronic tag is widely applied to the fields of commodity circulation, anti-counterfeiting traceability and the like, but a radio frequency electromagnetic field is adopted between the RFID and a reader-writer thereof as a carrier for energy and information transmission due to the working principle of the RFID.
When anti-counterfeiting authentication is carried out in a one-time one-certificate mode and the like, the server updates authentication information (data) acquired by the reader-writer, and the updated certificate information is written into the RFID through the reader-writer.
However, when the reader-writer writes the authentication certificate information to the RFID tag, the counterfeiter may sense the authentication information in the air and write it to the blank tag, thereby achieving the purpose of counterfeiting the RFID tag.
For example, a truck driver with a genuine wine is purchased by a counterfeiter who scans the RFID tag of each bottle of wine on the truck in turn, using a short period of time. And when the label is scanned each time, the server reads out the information in the label and updates the authentication information written in the RFID label of each bottle of wine, so that a counterfeiter obtains a large amount of real authentication information and a fake label is manufactured. As a serious consequence, the server updates the authentication information in the fake RFID tags by verification of the fake tags when the fake RFID tags are scanned before they are scanned. When a genuine RFID tag is scanned, it becomes a "fake" RFID tag because its authentication information has been updated. Therefore, with the deep development of anti-counterfeit verification technology, air defense interception becomes important. The invention provides an economic and effective interception-preventing solution through the specially designed RFID chip with a special encryption communication function and the matched application of the RFID chip and the verification system.
Disclosure of Invention
The invention aims to solve the problems in the prior art, and provides an economic and effective interception-preventing solution through the specially designed RFID chip with a special encryption communication function and the matched application of the RFID chip and a verification system. The invention discloses an RFID chip verification system with an encryption communication function for preventing interception in air, which is characterized in that:
the hardware part comprises a system server, an RFID reader-writer and an RFID tag;
the RFID tag comprises a calculation control unit and a storage unit;
the storage unit of the RFID tag writes verification data;
the storage unit is in the following two cases: only the non-encrypted data storage area, the non-encrypted data storage area and the encrypted data storage area (with password read-write protection)
The verification data is divided into the following two cases: only an unencrypted data portion, having an unencrypted data portion and an encrypted data portion; the method comprises the steps of carrying out a first treatment on the surface of the
The corresponding unencrypted data portion is stored in an unencrypted area of the storage unit; the encrypted data part is stored in an encryption area of the storage unit;
specifically:
when the non-encrypted data part N is written into the RFID tag by the reader-writer, the method comprises the following steps:
1) The reader acquires an unencrypted data portion N; the RFID chip calculation control unit receives the unencrypted data part N according to the rule E 11 Scrambling to form data E 11 (N);
2) The data E 11 (N) an unencrypted area written to the memory cell;
when the RFID tag is scanned by the reader-writer and the non-encryption area data of the storage unit is read, the method comprises the following steps:
1) The RFID calculation control unit calculates the data E of the unencrypted area in the storage unit 11 (N) according to rule E 21 After scrambling, the resulting data N' =e 21 (E 11 (N)); rule E 21 And E is 11 May be the same or different;
2) The reader-writer acquires the data N 'according to the system requirement or sends the data N' to the system server;
when the system writes the encrypted data part S into the RFID tag through the reader-writer, the method comprises the following steps:
1) The system server encrypts the encryption zone key data password according to a rule E 11 -1 After the descrambling, data E is obtained 11 -1 (password); (the superscript is provided with the rule of "-1", which means that the superscript is not provided with the inverse operation or inverse operation of the rule of "-1", which is the meaning of this patent everywhere)
2) The data E 11 -1 (password) when the reader-writer writes the RFID tag, obtaining data password for starting an encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 11 -1 (password) according to rule E 11 After scrambling, forming data;
3) The system server generates an encrypted data portion S;
alternatively, the system server generates an encrypted data portion S and follows a rule E 11 -1 After the descrambling, data E is obtained 11 -1 (S);
4) Data S or data E 11 -1 (S) is transmitted to the reader/writer, and when the reader/writer writes the RFID tag,
the RFID chip calculation control unit calculates the written data according to rule E 11 Scrambling to form E 11 (S) or S;
5)E 11 (S) or S is written to the memory cell;
when the system scans the RFID tag through the reader-writer and reads out the data of the encryption area, the system comprises the following steps:
1) The system server sends the encryption area password to the system server according to a rule E 11 -1 Data E is obtained after the anti-scrambling code is carried out 11 -1 (password);
2) The data E 11 -1 (password) writing the RFID tag into the reader-writer to obtain data password for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 11 -1 (password) according to rule E 11 After scramblingThe data formed;
3) The reader reads the data E 21 (E 11 (S)) or E 21 (S),
E 21 (E 11 (S)) or E 21 (S) is the encryption area data E in the storage unit by the RFID calculation control unit 11 (S) or S is in accordance with rule E 21 After scrambling, forming data;
4) The reader/writer reads data E 21 (E 11 (S)) or E 21 (S) sending to the system server;
5) The system performs data E according to the system design requirement 21 (E 11 (S)) or E 21 (S) performing corresponding operation to obtain required data;
the corresponding operations include:
for data E 21 (E 11 (S)) according to rule E 11 -1 And E is 21 -1 The back-scrambling code is used to obtain S,
or to data E 21 (S) according to rule E 21 -1 The back scrambling code gets S.
Another aspect of the present invention is characterized in that:
the hardware part comprises a system server, an RFID reader-writer and an RFID tag;
the RFID tag comprises a calculation control unit and a storage unit;
the storage unit of the RFID tag writes verification data;
the storage unit is in the following two cases: only the non-encrypted data storage area, the non-encrypted data storage area and the encrypted data storage area (with password read-write protection)
The verification data is divided into the following two cases: only an unencrypted data portion, having an unencrypted data portion and an encrypted data portion; the method comprises the steps of carrying out a first treatment on the surface of the
The corresponding unencrypted data portion is stored in an unencrypted area of the storage unit; the encrypted data part is stored in an encryption area of the storage unit;
specifically:
when the non-encrypted data part N is written into the RFID tag by the reader-writer, the method comprises the following steps:
1) The reader acquires an unencrypted data portion N; the RFID chip calculation control unit receives the unencrypted data part N according to the rule E 11 Scrambling to form data E 11 (N);
2) The data E 11 (N) an unencrypted area written to the memory cell;
when the RFID tag is scanned by the reader-writer and the non-encryption area data of the storage unit is read, the method comprises the following steps:
1) The RFID calculation control unit calculates the data E of the unencrypted area in the storage unit 11 (N) according to rule E 21 After scrambling, the resulting data N' =e 21 (E 11 (N)); rule E 21 And E is 11 May be the same or different;
2) The reader-writer acquires the data N 'according to the system requirement or sends the data N' to the system server;
when the system writes the encrypted data part S into the RFID tag through the reader-writer, the method comprises the following steps:
1) The system server encrypts the encryption zone key data password according to a rule E 11 -1 Anti-scrambling code according to rule E 12 After redundant interpolation, data password' =E is obtained 12 (E 11 -1 (password));
2) When the reader-writer writes the RFID tag, the data password' is obtained and is used for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 12 (E 11 -1 (password)) according to rule E 12 -1 Removing redundant interpolation, E 11 After scrambling, forming data;
3) The system server generates an encrypted data portion S and follows a rule E 12 After redundant interpolation, data E is formed 12 (S);
Alternatively, the system server generates an encrypted numberAccording to part S and rule E 11 -1 Anti-scrambling code according to rule E 12 After redundant interpolation, data E is obtained 12 (E 11 -1 (S));
4) Data E 12 (S) or data E 12 (E 11 -1 (S)) is transmitted to the reader/writer;
if it is data E 12 (S) when the reader/writer writes the RFID tag, the RFID chip calculates the data E written by the control unit 12 (S) according to rule E 12 -1 Removing redundant interpolation according to rule E 11 Scrambling is performed to form data E 11 (S);
If it is data E 12 (E 11 -1 (S)) when the reader/writer writes the RFID tag, the RFID chip calculates the data E written by the control unit 12 (E 11 -1 (S)) according to rule E 12 -1 Removing redundant interpolation according to rule E 11 Scrambling is carried out to form data S;
5)E 11 (S) or S is written to the memory cell;
when the system scans the RFID tag through the reader-writer and reads out the data of the encryption area, the system comprises the following steps:
1) The system server sends the encryption area password to the system server according to a rule E 11 -1 Performing anti-scrambling according to rule E 12 After redundant interpolation, obtaining data password'; password' =e 12 (E 11 -1 (password));
2) The data password' is written into the RFID tag through the reader-writer to obtain the data password, and the data password is used for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 12 (E 11 -1 (password)) according to rule E 12 -1 Performing redundancy elimination interpolation according to rule E 11 Data formed after scrambling is carried out;
3) The reader reads the data E 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)),
E 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) is the encryption area data E in the storage unit by the RFID calculation control unit 11 (S) or S is in accordance with rule E 21 Scrambling code, rule E 22 Performing redundant interpolation to form data;
4) The reader/writer reads data E 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) to the system server;
5) The system performs data E according to the system design requirement 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) performing corresponding operation to obtain required data;
the corresponding operations include:
for data E 22 (E 21 (E 11 (S))) according to rule E 22 -1 Removing redundant interpolation according to rule E 21 -1 And E is 11 -1 The back-scrambling code is used to obtain S,
or to data E 22 (E 21 (S)) according to rule E 22 -1 Removing redundant interpolation according to rule E 21 -1 The back scrambling code gets S.
Further, the calculation control unit is a digital logic calculation control unit, and the scrambling, interpolation and de-interpolation of input data are realized through a logic circuit;
or the calculation control unit is a microprocessor calculation control unit, and the microprocessor is used for realizing scrambling, interpolation and de-interpolation of input data; the scrambling operation may be encrypted with an encryption algorithm when the calculation control unit is a microprocessor calculation control unit.
Further, the verification system includes a digital certificate portion; the digital certificate part adopts a one-time one-certificate verification mode that the digital certificate part is updated once in each verification; after each certificate reading step is finished, the system server performs validity verification on the certificate;
if the verification is passed, updating the authentication data, and scrambling or scrambling interpolation is carried out on the updated authentication data to form data II; transmitting the verification result and the data II to a reader-writer, and entering the next step;
if the verification cannot be passed, sending a verification result to the reader-writer;
further, the password part may not perform scrambling operation according to chip design requirements.
Further, the interpolation method is as follows: randomly generated random redundancy codes are inserted into the original data according to one or more rules.
Further, the storage unit has a partial area which is an encryption storage unit; the key of the encryption storage unit is recorded as a password;
in the step 3), when the data II is formed, scrambling and interpolation are carried out on the updated authentication data and the password together to form the data II;
in the step 4), the data II is restored to updated authentication data and password; if the password is correct, the updated authentication data can be written into the encryption storage unit.
Further, the method comprises the steps of,
in the step 1), if scrambling and then interpolation are performed, in the step 3), the interpolation and then scrambling are firstly removed;
in the step 3), if scrambling and then interpolation are performed, in the step 4), the interpolation and then scrambling are performed first.
Further, the method comprises the steps of,
in the step 1), if interpolation is performed first and then scrambling is performed, in the step 3), scrambling is performed first and then interpolation is performed;
in the step 3), if interpolation is performed first and then scrambling is performed, in the step 4), scrambling is performed first and then interpolation is performed.
The technical effect of the invention is that even when the reader-writer writes the authentication information into the RFID tag, the counterfeiter can not restore the authentication information to the authentication information when detecting the data I or the data II in the air. Avoiding the possibility of a counterfeiter to mass scan genuine RFID tags to make counterfeit tags. So that the genuine RFID tag does not contain RFID tags that become "false".
Drawings
FIG. 1 is a block diagram of an RFID chip employed in the present patent;
fig. 2 is a system diagram of the present patent.
Detailed Description
The present invention is further described below with reference to examples, but it should not be construed that the scope of the above subject matter of the present invention is limited to the following examples. Various substitutions and alterations are made according to the ordinary skill and familiar means of the art without departing from the technical spirit of the invention, and all such substitutions and alterations are intended to be included in the scope of the invention.
Example 1:
RFID chip verification system with prevent encryption communication function that interception in air:
the hardware part comprises a system server, an RFID reader-writer and an RFID tag;
the RFID tag comprises a calculation control unit and a storage unit;
the storage unit of the RFID tag writes verification data;
the storage unit is in the following two cases: only the non-encrypted data storage area, the non-encrypted data storage area and the encrypted data storage area (with password read-write protection)
The verification data is divided into the following two cases: only an unencrypted data portion, having an unencrypted data portion and an encrypted data portion; the method comprises the steps of carrying out a first treatment on the surface of the
The corresponding unencrypted data portion is stored in an unencrypted area of the storage unit; the encrypted data part is stored in an encryption area of the storage unit;
specifically:
when the non-encrypted data part N is written into the RFID tag by the reader-writer, the method comprises the following steps:
1) The reader acquires an unencrypted data portion N [ 1001 ]; the numerals between brackets "[ and ] are exemplified, and the same applies below. The RFID chip calculation control unit receives the unencrypted data part N according to the rule E 11 (first and second bits are interchanged) scrambling to form data E 11 (N)〔0101〕;
2) The data E 11 (N) [ 0101 ] is written to the unencrypted area of the memory cell;
when the RFID tag is scanned by the reader-writer and the non-encryption area data of the storage unit is read, the method comprises the following steps:
1) The RFID calculation control unit calculates the data E of the unencrypted area in the storage unit 11 (N) [ 0101 ] according to rule E 21 (third and fourth bit interchange) scrambling, resulting in data N' =e 21 (E 11 (N)) [ 0110 ]; rule E 21 And E is 11 May be the same or different, and this embodiment is different;
2) The reader-writer acquires the data N 'according to the system requirement or sends the data N' to the system server;
when the system writes the encrypted data part S [ 0110 ] into the RFID tag through the reader-writer, the method comprises the following steps:
1) The system server encrypts the encryption area key data password [ 0101 ] according to the rule E 11 -1 (first and second bit interchange. Superscript tape' -1 "rule, meaning that superscript is not provided with" -1 "regular inverse operation or inverse operation, all the meanings of which are the same throughout this patent) to obtain data E 11 -1 (password)(1001);
2) The data E 11 -1 (password) [ 1001 ] when the reader-writer writes the RFID tag, obtain the data password [ 0101 ] to open the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 11 -1 (password) according to rule E 11 After scrambling, forming data;
3) The system server generates an encrypted data portion S [ 0110 ];
alternatively, the system server generates an encrypted data portion S and follows a rule E 11 -1 After (first and second bit interchange) the descrambled, data E is obtained 11 -1 (S)〔1010〕;
4) Data S [ 0110 ] or data E 11 -1 (S) [ 1010 ] is transmitted to the reader/writer, and when the reader/writer writes the RFID tag,
the RFID chip calculation control unit calculates the written data according to rule E 11 Scrambling to form E 11 (S) [ 1010 ] or S [ 0110 ];
5)E 11 (S) [ 1010 ] or S [ 0110 ] is written into the memory cell;
when the system scans the RFID tag through the reader-writer and reads out the data of the encryption area, the system comprises the following steps:
1) The system server sends the encryption area password [ 0101 ] to the system server according to the rule E 11 -1 Data E is obtained after the anti-scrambling code is carried out 11 -1 (password)〔1001〕;
2) The data E 11 -1 (password) writing the RFID tag into the reader-writer to obtain data password for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 11 -1 (password) according to rule E 11 Data formed after scrambling is carried out;
3) The reader reads the data E 21 (E 11 (S)) or E 21 (S),
E 21 (E 11 (S)) [ 1001 ] or E 21 (S) [ 0101 ] is the encryption area data E of the RFID calculation control unit to the storage unit 11 (S) [ 1010 ] or S [ 0110 ] according to rule E 21 After scrambling, forming data;
4) The reader/writer reads data E 21 (E 11 (S)) or E 21 (S) sending to the system server;
5) The system performs data E according to the system design requirement 21 (E 11 (S)) or E 21 (S) performing corresponding operation to obtain required data;
the corresponding operations include:
for data E 21 (E 11 (S)) according to rule E 11 -1 (first and second bit interchange) and E 21 -1 (third and fourth)Four bits interchanged) the descrambled code to obtain S,
or to data E 21 (S) according to rule E 21 -1 The back scrambling code gets S.
Example 2:
RFID chip verification system with prevent in air interception's encryption communication function, its characterized in that:
the hardware part comprises a system server, an RFID reader-writer and an RFID tag;
the RFID tag comprises a calculation control unit and a storage unit;
the storage unit of the RFID tag writes verification data;
the storage unit is in the following two cases: only the non-encrypted data storage area, the non-encrypted data storage area and the encrypted data storage area (with password read-write protection)
The verification data is divided into the following two cases: only an unencrypted data portion, having an unencrypted data portion and an encrypted data portion; the method comprises the steps of carrying out a first treatment on the surface of the
The corresponding unencrypted data portion is stored in an unencrypted area of the storage unit; the encrypted data part is stored in an encryption area of the storage unit;
specifically:
when the non-encrypted data part N is written into the RFID tag by the reader-writer, the method comprises the following steps:
1) The reader acquires an unencrypted data portion N [ 1001 ]; the RFID chip calculation control unit receives the unencrypted data portion N [ 1001 ] according to the rule E 11 (first and second bits are interchanged) scrambling to form data E 11 (N)〔0101〕;
2) The data E 11 (N) [ 0101 ] is written to the unencrypted area of the memory cell;
when the RFID tag is scanned by the reader-writer and the non-encryption area data of the storage unit is read, the method comprises the following steps:
1) The RFID calculation control unit calculates the data E of the unencrypted area in the storage unit 11 (N) according to rule E 21 After scrambling, the resulting data N'=E 21 (E 11 (N)); rule E 21 And E is 11 May be the same or different;
2) The reader-writer acquires the data N 'according to the system requirement or sends the data N' to the system server;
when the system writes the encrypted data part S [ 0110 ] into the RFID tag through the reader-writer, the method comprises the following steps:
1) The system server encrypts the encryption zone key data password according to a rule E 11 -1 (first and second bit interchange) anti-scrambling code according to rule E 12 After 10 redundant interpolations, data password' =e is obtained 12 (E 11 -1 (password))〔101010〕;
2) When the reader-writer writes the RFID tag, the data password' is obtained and is used for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 12 (E 11 -1 (password)) according to rule E 12 -1 Elimination of the previous 10 eliminates redundant interpolation, E 11 (first and second bits are interchanged) scrambling, and forming data;
3) The system server generates an encrypted data portion S [ 0110 ] and follows a rule E 12 After redundant interpolation, data E is formed 12 (S)〔100110〕;
Alternatively, the system server generates an encrypted data portion S [ 0110 ] and follows a rule E 11 -1 Anti-scrambling code according to rule E 12 After redundant interpolation, data E is obtained 12 (E 11 -1 (S))〔101010〕;
4) Data E 12 (S) [ 100110 ] or data E 12 (E 11 -1 (S)) [ 101010 ] is transmitted to the reader/writer;
if it is data E 12 (S) [ 100110 ] when the reader/writer writes the RFID tag, the RFID chip calculates the data E to be written by the control unit 12 (S) according to rule E 12 -1 Removing redundant interpolation according to rule E 11 Scrambling is performed to form data E 11 (S)〔1010〕;
If it is data E 12 (E 11 -1 (S)) [ 101010 ], when the reader/writer writes the RFID tag, the RFID chip calculates the data E to be written by the control unit 12 (E 11 -1 (S)) according to rule E 12 -1 Removing redundant interpolation according to rule E 11 Scrambling to form data S0110;
5)E 11 (S) [ 1010 ] or S [ 0110 ] is written into the memory cell;
when the system scans the RFID tag through the reader-writer and reads out the data of the encryption area, the system comprises the following steps:
1) The system server sends the encryption area password [ 0101 ] to the system server according to the rule E 11 -1 Performing anti-scrambling according to rule E 12 After redundant interpolation, obtaining data password' [ 101001 ]; password' =e 12 (E 11 -1 (password));
2) The data password' [ 101001 ] is written into the RFID tag through the reader-writer to obtain the data password, and the data password is used for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 12 (E 11 -1 (password)) according to rule E 12 -1 Performing redundancy elimination interpolation according to rule E 11 Data formed after scrambling is carried out;
3) The reader reads the data E 22 (E 21 (E 11 (S))) [ 012001 ] or E 22 (E 21 (S))〔010101〕,
E 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) is the encryption area data E in the storage unit by the RFID calculation control unit 11 (S) [ 1010 ] or S [ 0110 ] according to rule E 21 (third and fourth bit interchange) scrambling, rule E 22 The data formed after redundant interpolation is carried out by adding 01 in front;
4) The reader/writer reads data E 22 (E 21 (E 11 (S))) [ 012001 ] or E 22 (E 21 (S)) [ 010101 ] to the system server;
5) The system performs data E according to the system design requirement 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) performing corresponding operation to obtain required data;
the corresponding operations include:
for data E 22 (E 21 (E 11 (S))) [ 012001 ] according to rule E 22 -1 Removing the previous plus 01 eliminates redundant interpolation according to rule E 21 -1 And E is 11 -1 The descrambling code results in S0110, or for data E 22 (E 21 (S)) [ 010101 ] according to rule E 22 -1 Removing redundant interpolation according to rule E 21 -1 The back scrambling code yields S0110.
Example 3:
an RFID authentication system having functions of preventing interception in the air and encrypting communications, characterized in that:
the hardware part of the system comprises a system server and an RFID tag.
The RFID tag includes a calculation control unit and a storage unit.
The storage area of the RFID tag is written with authentication data.
The storage area is in the following two cases: only non-encrypted data storage area, and has non-encrypted data storage area and encrypted data storage area
The authentication data is divided into non-encrypted area data and encrypted area data. When there is only an unencrypted data storage area, reading and writing of encrypted area data is not performed.
Specifically:
when the non-encryption area data is written into the RFID tag through the reader-writer, the method comprises the following steps:
1) The reader/writer acquires non-encrypted area data (110110). The data I (101110) is a data of the encryption area in the written encryption area data storage unit, which is scrambled by the RFID chip calculation control unit (E 11 -exchanging the second bit with the third bit, the scrambling rules being varied and chosen according to the actual situation, here by way of example only, the following applies).
2) The data I is written to the memory cell unencrypted area.
When the reader-writer scans the RFID tag and reads out the data in the unencrypted area, the method comprises the following steps:
1) The reader/writer goes to data N (101110). The data N is the scrambling code (E) of the RFID calculation control unit to the non-encryption area data in the storage unit 11 ) And data formed later.
2) The reader-writer acquires the data N according to the system requirement or sends the data N to the system server.
When the system writes the encrypted area data into the RFID tag through the reader-writer, the method comprises the following steps:
1) The system server descrambles (E) the encrypted zone data (100100) 11 -1 -third and fourth bit interchange) and redundant interpolation (E 12 Data I (1010100001) are obtained after adding 10 and 01 to the front and back, respectively.
2) The data I (1010100001) is written into the RFID tag through the reader-writer to obtain data II. The data II (100100) is the scrambling code (E) of the written data I by the RFID chip calculation control unit 11 -third bit and fourth bit interchange) and removing redundant interpolation E # 12 -1 -removing 10 and 01) respectively from the resulting data.
3) The data II is written to a memory cell.
When the system scans the RFID tag through the reader-writer and reads out the data of the encryption area, the system comprises the following steps:
1) The reader reads data III (0101010010), the data III is that the RFID calculation control unit scrambles the encryption area data II (100100) in the storage unit (E) 21 -first bit and second bit interchange) and redundant interpolation (E 22 -adding 01 and 10) to the front and back respectively.
2) The reader sends data III to the system server.
3) The system carries out corresponding operation on the data III according to the system design requirement to obtain the required data. The corresponding operations include: de-redundant interpolation of data III (E 22 -1 Remove 01 and 10, respectively, back and forth). Or de-redundant interpolation of data III (E 22 -1 -front-back removal of 01 and 10 respectively) and back-scrambling (E 21 -1 First bit and second bit interchange).
Example 4:
this embodiment is mainly to use embodiment 1 in the authentication technique of "one-time-one-certificate".
The RFID electronic tag according to claim 1 of patent CN201410140584.2, wherein the message MB is written in i,j . Said message MB i,j The encrypted area data is processed by the method described in embodiment 1 and stored in the RFID electronic tag.
Example 5:
this embodiment is mainly to use embodiment 1 in the authentication technique of "one-time-one-certificate".
Any article of merchandise according to claim 2 of patent CN201410140584.2 corresponds to a message MA consisting of a serial number i I=1, 2, … … n. In the RFID electronic tag on any commodity, the combined message T1 is written i,j . Combined message T1 i,j From message CA i Sum message MB i,j Is combined. Further, CA i As the non-encrypted area data, the non-encrypted area data is stored in the RFID electronic tag after being processed by the method described in embodiment 1. MB (MB) i,j As the encryption area data, the encryption area data is stored in the RFID electronic tag after being processed by the method described in embodiment 1.
Example 6:
the calculation control unit is a digital logic calculation control unit, and the scrambling, interpolation and de-interpolation of input data are realized through a logic circuit.
Or the calculation control unit is a microprocessor calculation control unit, and the microprocessor is used for realizing scrambling, interpolation and de-interpolation of input data.
Example 7:
the storage unit has a partial area which is an encrypted storage unit. The key of the encrypted storage unit is denoted as password.
In step 3), when the data II is formed, the updated authentication data and the password are scrambled and interpolated together to form the data II.
In step 4), the data II is restored to updated authentication data and password. If the password is correct, the updated authentication data can be written into the encryption storage unit.

Claims (9)

1. RFID chip verification system with prevent in air interception's encryption communication function, its characterized in that:
the hardware part comprises a system server, an RFID reader-writer and an RFID tag;
the RFID tag comprises a calculation control unit and a storage unit;
the storage unit of the RFID tag writes verification data;
the storage unit is in the following two cases: only the non-encrypted data storage area, the encrypted data storage area with the non-encrypted data storage area and the password read-write protection;
the verification data is divided into the following two cases: only an unencrypted data portion, having an unencrypted data portion and an encrypted data portion;
the corresponding unencrypted data portion is stored in an unencrypted area of the storage unit; the encrypted data part is stored in an encryption area of the storage unit;
specifically:
when the non-encrypted data part N is written into the RFID tag by the reader-writer, the method comprises the following steps:
1) The reader acquires an unencrypted data portion N; the RFID chip calculation control unit receives the unencrypted data part N according to the rule E 11 Scrambling to form data E 11 (N);
2) The data E 11 (N) an unencrypted area written to the memory cell;
when the RFID tag is scanned by the reader-writer and the non-encryption area data of the storage unit is read, the method comprises the following steps:
1) The RFID calculation control unit calculates the data E of the unencrypted area in the storage unit 11 (N) according to rule E 21 After scrambling, the resulting data N' =e 21 (E 11 (N)); rule E 21 And E is 11 May be the same or different;
2) The reader-writer acquires the data N 'according to the system requirement or sends the data N' to the system server;
when the system writes the encrypted data part S into the RFID tag through the reader-writer, the method comprises the following steps:
1) The system server encrypts the encryption zone key data password according to a rule E 11 -1 After the descrambling, data E is obtained 11 -1 (password);
2) The data E 11 -1 (password) when the reader-writer writes the RFID tag, obtaining data password for starting an encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 11 -1 (password) according to rule E 11 After scrambling, forming data;
3) The system server generates an encrypted data portion S;
alternatively, the system server generates an encrypted data portion S and follows a rule E 11 -1 After the descrambling, data E is obtained 11 -1 (S);
4) Data S or data E 11 -1 (S) is transmitted to the reader/writer, and when the reader/writer writes the RFID tag,
the RFID chip calculation control unit calculates the written data according to rule E 11 Scrambling to form E 11 (S) or S;
5)E 11 (S) or S is written to the memory cell;
when the system scans the RFID tag through the reader-writer and reads out the data of the encryption area, the system comprises the following steps:
1) The system server sends the encryption area password to the system server according to a rule E 11 -1 Data E is obtained after the anti-scrambling code is carried out 11 -1 (password);
2) The data E 11 -1 (password) writing the RFID tag into the reader-writer to obtain data password for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 11 -1 (password) according to rule E 11 Data formed after scrambling is carried out;
3) The reader reads the data E 21 (E 11 (S)) or E 21 (S),
E 21 (E 11 (S)) or E 21 (S) is the encryption area data E in the storage unit by the RFID calculation control unit 11 (S) or S is in accordance with rule E 21 After scrambling, forming data;
4) The reader/writer reads data E 21 (E 11 (S)) or E 21 (S) sending to the system server;
5) The system performs data E according to the system design requirement 21 (E 11 (S)) or E 21 (S) performing corresponding operation to obtain required data;
the corresponding operations include:
for data E 21 (E 11 (S)) according to rule E 11 -1 And E is 21 -1 The back-scrambling code is used to obtain S,
or to data E 21 (S) according to rule E 21 -1 The back scrambling code gets S.
2. RFID chip verification system with prevent in air interception's encryption communication function, its characterized in that:
the hardware part comprises a system server, an RFID reader-writer and an RFID tag;
the RFID tag comprises a calculation control unit and a storage unit;
the storage unit of the RFID tag writes verification data;
the storage unit is in the following two cases: only the non-encrypted data storage area, the encrypted data storage area with the non-encrypted data storage area and the password read-write protection;
the verification data is divided into the following two cases: only an unencrypted data portion, having an unencrypted data portion and an encrypted data portion;
the corresponding unencrypted data portion is stored in an unencrypted area of the storage unit; the encrypted data part is stored in an encryption area of the storage unit;
specifically:
when the non-encrypted data part N is written into the RFID tag by the reader-writer, the method comprises the following steps:
1) The reader acquires an unencrypted data portion N; the RFID chip calculation control unit receives the unencrypted data part N according to the rule E 11 Scrambling to form data E 11 (N);
2) The data E 11 (N) an unencrypted area written to the memory cell;
when the RFID tag is scanned by the reader-writer and the non-encryption area data of the storage unit is read, the method comprises the following steps:
1) The RFID calculation control unit calculates the data E of the unencrypted area in the storage unit 11 (N) according to rule E 21 After scrambling, the resulting data N' =e 21 (E 11 (N)); rule E 21 And E is 11 May be the same or different;
2) The reader-writer acquires the data N 'according to the system requirement or sends the data N' to the system server;
when the system writes the encrypted data part S into the RFID tag through the reader-writer, the method comprises the following steps:
1) The system server encrypts the encryption zone key data password according to a rule E 11 -1 Anti-scrambling code according to rule E 12 After redundant interpolation, data password' =E is obtained 12 (E 11 -1 (password));
2) The data password' writes the RFID tag in the reader-writerWhen signing, obtaining data password for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 12 (E 11 -1 (password)) according to rule E 12 -1 Removing redundant interpolation, E 11 After scrambling, forming data;
3) The system server generates an encrypted data portion S and follows a rule E 12 After redundant interpolation, data E is formed 12 (S);
Alternatively, the system server generates an encrypted data portion S and follows a rule E 11 -1 Anti-scrambling code according to rule E 12 After redundant interpolation, data E is obtained 12 (E 11 -1 (S));
4) Data E 12 (S) or data E 12 (E 11 -1 (S)) is transmitted to the reader/writer;
if it is data E 12 (S) when the reader/writer writes the RFID tag, the RFID chip calculates the data E written by the control unit 12 (S) according to rule E 12 -1 Removing redundant interpolation according to rule E 11 Scrambling is performed to form data E 11 (S);
If it is data E 12 (E 11 -1 (S)) when the reader/writer writes the RFID tag, the RFID chip calculates the data E written by the control unit 12 (E 11 -1 (S)) according to rule E 12 -1 Removing redundant interpolation according to rule E 11 Scrambling is carried out to form data S;
5)E 11 (S) or S is written to the memory cell;
when the system scans the RFID tag through the reader-writer and reads out the data of the encryption area, the system comprises the following steps:
1) The system server sends the encryption area password to the system server according to a rule E 11 -1 Performing anti-scrambling according to rule E 12 After redundant interpolation, obtaining data password'; password' =e 12 (E 11 -1 (password));
2) The data password'Writing the RFID tag into the reader-writer to obtain a data password for starting the encryption area of the storage unit; the data password is received data E by the RFID chip computing control unit 12 (E 11 -1 (password)) according to rule E 12 -1 Performing redundancy elimination interpolation according to rule E 11 Data formed after scrambling is carried out;
3) The reader reads the data E 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)),
E 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) is the encryption area data E in the storage unit by the RFID calculation control unit 11 (S) or S is in accordance with rule E 21 Scrambling code, rule E 22 Performing redundant interpolation to form data;
4) The reader/writer reads data E 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) to the system server;
5) The system performs data E according to the system design requirement 22 (E 21 (E 11 (S))) or E 22 (E 21 (S)) performing corresponding operation to obtain required data;
the corresponding operations include:
for data E 22 (E 21 (E 11 (S))) according to rule E 22 -1 Removing redundant interpolation according to rule E 21 -1 And E is 11 -1 The back-scrambling code is used to obtain S,
or to data E 22 (E 21 (S)) according to rule E 22 -1 Removing redundant interpolation according to rule E 21 -1 The back scrambling code gets S.
3. The RFID chip authentication system with an encrypted communication function of preventing interception in air according to claim 1 or 2, wherein:
the calculation control unit is a digital logic calculation control unit and is used for realizing scrambling, interpolation and de-interpolation of input data through a logic circuit;
or the calculation control unit is a microprocessor calculation control unit, and the microprocessor is used for realizing scrambling, interpolation and de-interpolation of input data; the scrambling operation may be encrypted with an encryption algorithm when the calculation control unit is a microprocessor calculation control unit.
4. The RFID chip authentication system with an encrypted communication function of preventing interception in air according to claim 1 or 2, wherein: the verification system includes a digital certificate portion; the digital certificate part adopts a one-time one-certificate verification mode that the digital certificate part is updated once in each verification; after each certificate reading step is finished, the system server performs validity verification on the certificate;
if the verification is passed, updating the digital certificate, and scrambling or scrambling interpolation is carried out on the updated authentication data to form data II; transmitting the verification result and the data II to a reader-writer, and entering the next step;
if the verification cannot be passed, the verification result is sent to the reader-writer.
5. The RFID chip authentication system with an encrypted communication function of preventing interception in air according to claim 1 or 2, wherein: the password part can not perform scrambling operation according to the chip design requirement.
6. The RFID chip authentication system with an encrypted communication function of preventing interception in air according to claim 2, wherein: the interpolation method is as follows: randomly generated random redundancy codes are inserted into the original data according to one or more rules.
7. The RFID chip authentication system with an encrypted communication function of preventing interception in air according to claim 1 or 2, wherein: the storage unit has a partial area which is an encryption storage unit; the key of the encryption storage unit is recorded as a password;
in the step 3), when the data II is formed, scrambling and interpolation are carried out on the updated authentication data and the password together to form the data II;
in the step 4), the data II is restored to updated authentication data and password; if the password is correct, the updated authentication data can be written into the encryption storage unit.
8. The RFID chip authentication system with an encrypted communication function of preventing interception in air according to claim 1 or 2, wherein:
in the step 1), if scrambling and then interpolation are performed, in the step 3), the interpolation and then scrambling are firstly removed;
in the step 3), if scrambling and then interpolation are performed, in the step 4), the interpolation and then scrambling are performed first.
9. The RFID chip authentication system with an encrypted communication function of preventing interception in air according to claim 1 or 2, wherein:
in the step 1), if interpolation is performed first and then scrambling is performed, in the step 3), scrambling is performed first and then interpolation is performed;
in the step 3), if interpolation is performed first and then scrambling is performed, in the step 4), scrambling is performed first and then interpolation is performed.
CN201911140463.7A 2019-11-20 2019-11-20 RFID chip verification system with anti-air interception and encryption communication functions Active CN112396140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911140463.7A CN112396140B (en) 2019-11-20 2019-11-20 RFID chip verification system with anti-air interception and encryption communication functions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911140463.7A CN112396140B (en) 2019-11-20 2019-11-20 RFID chip verification system with anti-air interception and encryption communication functions

Publications (2)

Publication Number Publication Date
CN112396140A CN112396140A (en) 2021-02-23
CN112396140B true CN112396140B (en) 2023-08-04

Family

ID=74603731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911140463.7A Active CN112396140B (en) 2019-11-20 2019-11-20 RFID chip verification system with anti-air interception and encryption communication functions

Country Status (1)

Country Link
CN (1) CN112396140B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038634A (en) * 2007-04-23 2007-09-19 中国振华(集团)科技股份有限公司 Production RFID false proof method with logic control unit
CN102687457A (en) * 2009-05-15 2012-09-19 里维尔技术有限责任公司 System for encrypting and decrypting a plaintext message with authentication
CN106971311A (en) * 2017-04-26 2017-07-21 长春市万易科技有限公司 A kind of false proof traceability system of logistics Means of Agricultural Production and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101038634A (en) * 2007-04-23 2007-09-19 中国振华(集团)科技股份有限公司 Production RFID false proof method with logic control unit
CN102687457A (en) * 2009-05-15 2012-09-19 里维尔技术有限责任公司 System for encrypting and decrypting a plaintext message with authentication
CN106971311A (en) * 2017-04-26 2017-07-21 长春市万易科技有限公司 A kind of false proof traceability system of logistics Means of Agricultural Production and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种RFID隐私保护认证协议及其应用研究;常振华;《中国优秀硕士学位论文全文数据库 (信息科技辑)》;20100715;I138-759 *

Also Published As

Publication number Publication date
CN112396140A (en) 2021-02-23

Similar Documents

Publication Publication Date Title
EP3118776B1 (en) Security authentication method for hiding ultra high frequency electronic tag identifier
EP1454291B1 (en) Secure data tagging systems
CN101847199B (en) Security authentication method for radio frequency recognition system
EP2002382B1 (en) Method and device for obtaining item information using rfid tags
CN106845304B (en) A kind of method and system for realizing reader and smart-tag authentication in RFID system
KR20200012845A (en) Progressive Key Encryption Algorithm
EP2425281A1 (en) System and method for authenticating rfid tags
JP2008517856A (en) Master tag
CN102831529A (en) Radio frequency based commodity information identification method and system
CN104166871A (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
KR100723868B1 (en) Method for verifying RFID tag and reader each other in EPC C1G2 RFID system
JP2005295408A (en) Enciphering device, decoding device, enciphering and decoding system, and key information updating system
CN202870898U (en) Radio frequency-based commodity information identification system
CN104700125A (en) AES encryption and verification of ultra high frequency radio identification system
CN112862501A (en) Commodity anti-counterfeiting method based on NFC encryption chip
CN103971245A (en) Combined encryption system for commodity electronic forgery proofing
CN101739593B (en) Safety certification method of medium access control codes of integrated circuit cards
CN112396140B (en) RFID chip verification system with anti-air interception and encryption communication functions
JP2003281495A (en) Information storing matter for storing information by using tag and device concerning them
CN101588238A (en) Method for encrypting and decrypting certificate card in accreditation system
CN107046467B (en) Three-party verification method and system based on reader-writer, label and database
KR20040092669A (en) A rfid terminal and a tag with security function
US20180288613A1 (en) Authentication method, authentication system and authentication devices for authenticating an object
CN1598862A (en) Encipher / decipher method for identity information and recognition system
CN104346643B (en) Based on encryption method of the aes algorithm to the 925MHz electronic vehicle license plate systems of UHF 920

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant